Steven Bowcut


Massive Data Breach Hits WideOpenWest, Hackers Claim Control and Leak Customer Data In a concerning escalation of cybersecurity threats targeting major service providers, a previously unknown ransomware group named Arkana Security has claimed responsibility for a substantial security breach at WideOpenWest (WoW), one of America’s largest cable operators and internet […]

WoW Hit by Massive Breach as Arkana Ransomware Exposes Weak ...


In Episode S7E6 of the Brilliance Security Magazine Podcast, host Steven Bowcut sits down with Dmitri Vellikok, VP of Embedded Security at F-Secure, to discuss F-Secure’s newly launched Scam Kill Chain Framework and explore critical insights into how cybercriminals select and exploit their targets. Summary The Inspiration Behind Scam Kill […]

Inside the Mind of Cybercriminals: Unpacking F-Secure’s Scam Kill Chain


In Episode S7E5, host Steven Bowcut speaks with Ian Amit, CEO and Founder of Gomboc AI. The conversation covers various aspects of Gomboc AI and its approach to computer science and cybersecurity. Ian shares his practical problem-solving philosophy and insights into the evolving landscape of cybersecurity, highlighting the impact of […]

Cloud Security: AI, Automation, and the Evolution in Cyber Defense



In Episode S7E4, David Matalon, CEO and Founder of Venn, joins Steven Bowcut to explore the evolving landscape of remote work security and the challenges of traditional Virtual Desktop Infrastructure (VDI). David shares insights into how financial services and other industries have struggled with data security, compliance, and usability in […]

Securing the Future of BYOD: Redefining Remote Work Security


In Episode S7E3, the discussion features Marko Simenov, CEO of Plainsea, who talks about the company’s innovative augmented penetration testing platform. Marko explains the origins of Plainsea, its unique features, and its benefits to both pen-testing companies and their clients, including time and cost savings, continuous testing capabilities, and improved […]

Augmented Penetration Testing




In Episode S7E1, host Steven Bowcut and SPHERE CEO Rita Gurevich discuss the significance of identity hygiene in cybersecurity. They highlight its ongoing nature, challenges in identity management, the need for automation, and its effect on cyber insurance costs. The episode wraps up by exploring how these concepts apply across […]

Mastering Identity Hygiene: A New Standard in Cybersecurity


Revolutionizing Healthcare Communication with Secure AI Analog Informatics Corporation (AIC), a trailblazer in patient engagement, reputation management, and scheduling solutions for healthcare providers, has officially launched with a mission to modernize and democratize healthcare communication. By leveraging secure AI and modern communication technologies, AIC aims to bridge the gap between […]

Analog Informatics Corporation Launches to Transform Healthcare Communication


In the fast-evolving world of technology, where the stakes are high and the pace relentless, being recognized for innovation and growth is a significant accomplishment. Cyware, a leader in threat intelligence management, low-code/no-code automation, and cyber fusion solutions, has done just that—earning a coveted spot on the prestigious Deloitte Technology […]

Cyware Secures Spot on Deloitte Technology Fast 500™ Once Again



In the ever-evolving world of cybersecurity, few names command as much respect as Lawrence Pingree. Pingree, a thought leader with nearly three decades of experience, has left an indelible mark on the industry, shaping critical advancements in cybersecurity technology and strategy. Now, he is bringing his expertise to Dispersive, a […]

Stealth Networking Meets Cyber Visionary: Dispersive Welcomes Lawrence Pingree as ...


Having tested and reviewed several iStorage products, I have never been disappointed, and the new iStorage diskAshur DT3 is no exception. Known for delivering the highest-quality hardware-encrypted drives, iStorage continues to set the gold standard in secure storage solutions. With the DT3, they’ve once again combined advanced security features with […]

Review: iStorage diskAshur DT3 – The Ultimate in Secure Storage


Strategic Merger to Address Growing Cybersecurity Needs On September 25, 2024, TRG, a global leader in managed services, announced its formal merger with Inversion6, its sister company under TruWest Holdings. This merger represents a significant move for TRG, expanding its offerings to include comprehensive cybersecurity services alongside its existing endpoint […]

TRG Merges with Inversion6 to Expand Cybersecurity Offerings